Lucene search

K
ubuntuUbuntuUSN-6422-1
HistoryOct 09, 2023 - 12:00 a.m.

Ring vulnerabilities

2023-10-0900:00:00
ubuntu.com
25

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

87.9%

Releases

  • Ubuntu 23.04
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • ring - Secure and distributed voice, video and chat platform

Details

It was discovered that Ring incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-37706)

It was discovered that Ring incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302,
CVE-2021-43303, CVE-2021-43804, CVE-2021-43845, CVE-2022-21723,
CVE-2022-23537, CVE-2022-23547, CVE-2022-23608, CVE-2022-24754,
CVE-2022-24763, CVE-2022-24764, CVE-2022-24793, CVE-2022-31031,
CVE-2022-39244)

It was discovered that Ring incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.04 LTS. (CVE-2022-21722)

It was discovered that Ring incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
(CVE-2023-27585)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.04noarchjami< 20230206.0~ds1-5ubuntu0.1UNKNOWN
Ubuntu23.04noarchjami-daemon< 20230206.0~ds1-5ubuntu0.1UNKNOWN
Ubuntu23.04noarchjami-daemon-dbgsym< 20230206.0~ds1-5ubuntu0.1UNKNOWN
Ubuntu23.04noarchjami-dbgsym< 20230206.0~ds1-5ubuntu0.1UNKNOWN
Ubuntu20.04noarchjami< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Ubuntu20.04noarchjami-daemon< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Ubuntu20.04noarchjami-daemon-dbgsym< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Ubuntu20.04noarchjami-dbgsym< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Ubuntu20.04noarchring< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Ubuntu20.04noarchring-daemon< 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1UNKNOWN
Rows per page:
1-10 of 161

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

87.9%